{"id":642,"date":"2011-09-12T16:08:16","date_gmt":"2011-09-12T15:08:16","guid":{"rendered":"http:\/\/www.solucominsight.fr\/?p=642"},"modified":"2019-12-31T12:25:42","modified_gmt":"2019-12-31T11:25:42","slug":"cloud-computing-maitriser-ses-couts-grace-a-une-bonne-gestion-des-identites","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/09\/cloud-computing-maitriser-ses-couts-grace-a-une-bonne-gestion-des-identites\/","title":{"rendered":"Cloud computing : ma\u00eetriser ses co\u00fbts gr\u00e2ce \u00e0 une bonne gestion des identit\u00e9s"},"content":{"rendered":"<p>Attrayants, simples d\u2019usage et facilement d\u00e9ployables, les services <em>cloud<\/em> se sont rapidement r\u00e9pandus au sein des grandes entreprises. Leurs mod\u00e8les de co\u00fbts ont aussi s\u00e9duit de nombreuses directions g\u00e9n\u00e9rales\u00a0: bas\u00e9s la plupart du temps sur le nombre d&#8217;utilisateurs actifs, ils semblent simples, efficaces et pr\u00e9dictibles.<\/p>\n<p><strong>La difficult\u00e9 de la pr\u00e9dictibilit\u00e9 des co\u00fbts dans le cloud<\/strong><\/p>\n<p>Le mod\u00e8le du <em>cloud<\/em> n\u00e9cessite une attention forte pour ne pas perdre au bout de quelques temps les gains \u00e9conomiques escompt\u00e9s, voire \u00e9viter une r\u00e9elle d\u00e9rive des co\u00fbts. Dans le <em>cloud<\/em>, comme au sein du SI historique, une gestion fiable des identit\u00e9s est ainsi essentielle pour garantir durablement la ma\u00eetrise du nombre d\u2019acc\u00e9dants \u00e0 ces services.<\/p>\n<p>Bien \u00e9videmment, elle vise \u00e9galement \u00e0 renforcer la protection de l\u2019acc\u00e8s aux informations qui y sont stock\u00e9es. Elle y est m\u00eame encore plus indispensable, vu l\u2019absence de garde-fous traditionnellement rencontr\u00e9s, comme par exemple la \u00ab\u00a0porte d\u2019entr\u00e9e\u00a0\u00bb <em>Active Directory<\/em>\u00a0ou le contr\u00f4le d\u2019acc\u00e8s physique.<\/p>\n<p><strong>G\u00e9rer les identit\u00e9s dans le <em>cloud<\/em>\u00a0: quelles strat\u00e9gies gagnantes\u00a0?<\/strong><\/p>\n<p>Comment le faire concr\u00e8tement\u00a0? Plusieurs solutions sont envisageables :<\/p>\n<p>&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <strong>Gestion manuelle sur le site du service <em>cloud<\/em> par les \u00e9quipes de l\u2019entreprise.<\/strong> C\u2019est certes efficace pour lancer rapidement des initiatives <em>cloud<\/em>, mais il faut pr\u00e9voir de rencontrer, tout aussi rapidement, toutes les limites bien connues de la gestion manuelle\u00a0: \u00e9cart, difficult\u00e9s de maintien, complexit\u00e9 des revues\u2026<\/p>\n<p>&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <strong>Gestion automatis\u00e9e via un service de provisioning\/deprovisioning avec des contr\u00f4les a priori (validations) et\/ou a posteriori (contr\u00f4les et recertifications)<\/strong>\u00a0: l\u2019acc\u00e8s aux services <em>cloud<\/em> pilot\u00e9 par les processus et les outils IAM de l\u2019entreprise. M\u00eames solutions que dans le SI historique\u2026 et m\u00eames vigilances et bonnes pratiques pour \u00e9viter toute d\u00e9sillusion\u00a0!<\/p>\n<p>&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <strong>Gestion automatis\u00e9e via un service de f\u00e9d\u00e9ration d\u2019identit\u00e9s<\/strong>\u00a0: certainement aujourd\u2019hui la solution \u00e0 privil\u00e9gier quand cela est possible, puisqu\u2019elle apporte des r\u00e9ponses satisfaisantes aussi bien sur les probl\u00e9matiques de gestion au quotidien qu\u2019en termes d\u2019exp\u00e9rience utilisateur. Apr\u00e8s des ann\u00e9es de balbutiements o\u00f9 les entreprises n\u2019allaient quasiment jamais plus loin qu\u2019un prototype, les derniers dix-huit mois marquent le r\u00e9el envol de la f\u00e9d\u00e9ration avec des r\u00e9alisations significatives.<\/p>\n<p>&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <strong>Gestion automatis\u00e9e et f\u00e9d\u00e9r\u00e9e par un tiers de confiance<\/strong>, jouant le r\u00f4le d\u2019interm\u00e9diaire entre l\u2019entreprise et les diff\u00e9rents offreurs de services <em>cloud<\/em>. Des acteurs commencent \u00e0 se positionner sur ce sujet, mais la classique question de la confiance se pose\u00a0!<\/p>\n<p><strong>Le <em>cloud<\/em>\u00a0: un booster pour les projets IAM<\/strong><\/p>\n<p>Sujets \u00e0 traiter, bon sens et bonnes pratiques, priorisation et angles d\u2019attaque, risques et \u00e9cueils \u00e0 \u00e9viter\u00a0: la gestion des identit\u00e9s dans le <em>cloud<\/em> doit relever les m\u00eames challenges que dans le SI historique.<\/p>\n<p>Et si le <em>cloud<\/em> \u00e9tait un levier formidable pour d\u2019une part simplifier et fiabiliser les processus et outillages IAM actuels, et d\u2019autre part faire d\u00e9coller l\u2019usage de nouveaux services IAM de type reporting et recertification\u00a0?<\/p>\n<div>\n<hr align=\"left\" size=\"1\" width=\"33%\" \/>\n<div>\n<div>\n<p>\u00a0<a href=\"#_msoanchor_1\"><br \/>\n<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Attrayants, simples d\u2019usage et facilement d\u00e9ployables, les services cloud se sont rapidement r\u00e9pandus au sein des grandes entreprises. Leurs mod\u00e8les de co\u00fbts ont aussi s\u00e9duit de nombreuses directions g\u00e9n\u00e9rales\u00a0: bas\u00e9s la plupart du temps sur le nombre d&#8217;utilisateurs actifs, ils&#8230;<\/p>\n","protected":false},"author":122,"featured_media":6343,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[36,3224],"tags":[80,145,144,3305,81],"coauthors":[969],"class_list":["post-642","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-digital-trust","category-digital-identity","tag-cloud","tag-iam","tag-identite","tag-identity-access-management","tag-protection-des-donnees"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cloud computing : ma\u00eetriser ses co\u00fbts gr\u00e2ce \u00e0 une bonne gestion des identit\u00e9s - RiskInsight<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/09\/cloud-computing-maitriser-ses-couts-grace-a-une-bonne-gestion-des-identites\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cloud computing : ma\u00eetriser ses co\u00fbts gr\u00e2ce \u00e0 une bonne gestion des identit\u00e9s - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"Attrayants, simples d\u2019usage et facilement d\u00e9ployables, les services cloud se sont rapidement r\u00e9pandus au sein des grandes entreprises. Leurs mod\u00e8les de co\u00fbts ont aussi s\u00e9duit de nombreuses directions g\u00e9n\u00e9rales\u00a0: bas\u00e9s la plupart du temps sur le nombre d&#8217;utilisateurs actifs, ils...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/09\/cloud-computing-maitriser-ses-couts-grace-a-une-bonne-gestion-des-identites\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2011-09-12T15:08:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-31T11:25:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"573\" \/>\n\t<meta property=\"og:image:height\" content=\"214\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Emmanuel Cosperec\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Emmanuel Cosperec\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/09\/cloud-computing-maitriser-ses-couts-grace-a-une-bonne-gestion-des-identites\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/09\/cloud-computing-maitriser-ses-couts-grace-a-une-bonne-gestion-des-identites\/\"},\"author\":{\"name\":\"Emmanuel Cosperec\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/512cf02fc77c33ae348d88e577629bdb\"},\"headline\":\"Cloud computing : ma\u00eetriser ses co\u00fbts gr\u00e2ce \u00e0 une bonne gestion des identit\u00e9s\",\"datePublished\":\"2011-09-12T15:08:16+00:00\",\"dateModified\":\"2019-12-31T11:25:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/09\/cloud-computing-maitriser-ses-couts-grace-a-une-bonne-gestion-des-identites\/\"},\"wordCount\":554,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/09\/cloud-computing-maitriser-ses-couts-grace-a-une-bonne-gestion-des-identites\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg\",\"keywords\":[\"Cloud\",\"IAM\",\"identit\u00e9\",\"identity &amp; access management\",\"protection des donn\u00e9es\"],\"articleSection\":[\"Cybersecurity &amp; Digital Trust\",\"Digital Identity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/09\/cloud-computing-maitriser-ses-couts-grace-a-une-bonne-gestion-des-identites\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/09\/cloud-computing-maitriser-ses-couts-grace-a-une-bonne-gestion-des-identites\/\",\"name\":\"Cloud computing : ma\u00eetriser ses co\u00fbts gr\u00e2ce \u00e0 une bonne gestion des identit\u00e9s - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/09\/cloud-computing-maitriser-ses-couts-grace-a-une-bonne-gestion-des-identites\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/09\/cloud-computing-maitriser-ses-couts-grace-a-une-bonne-gestion-des-identites\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg\",\"datePublished\":\"2011-09-12T15:08:16+00:00\",\"dateModified\":\"2019-12-31T11:25:42+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/09\/cloud-computing-maitriser-ses-couts-grace-a-une-bonne-gestion-des-identites\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/09\/cloud-computing-maitriser-ses-couts-grace-a-une-bonne-gestion-des-identites\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/09\/cloud-computing-maitriser-ses-couts-grace-a-une-bonne-gestion-des-identites\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg\",\"width\":573,\"height\":214},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/09\/cloud-computing-maitriser-ses-couts-grace-a-une-bonne-gestion-des-identites\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cloud computing : ma\u00eetriser ses co\u00fbts gr\u00e2ce \u00e0 une bonne gestion des identit\u00e9s\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/512cf02fc77c33ae348d88e577629bdb\",\"name\":\"Emmanuel Cosperec\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/emmanuel-cosperec\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cloud computing : ma\u00eetriser ses co\u00fbts gr\u00e2ce \u00e0 une bonne gestion des identit\u00e9s - RiskInsight","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/09\/cloud-computing-maitriser-ses-couts-grace-a-une-bonne-gestion-des-identites\/","og_locale":"en_US","og_type":"article","og_title":"Cloud computing : ma\u00eetriser ses co\u00fbts gr\u00e2ce \u00e0 une bonne gestion des identit\u00e9s - RiskInsight","og_description":"Attrayants, simples d\u2019usage et facilement d\u00e9ployables, les services cloud se sont rapidement r\u00e9pandus au sein des grandes entreprises. Leurs mod\u00e8les de co\u00fbts ont aussi s\u00e9duit de nombreuses directions g\u00e9n\u00e9rales\u00a0: bas\u00e9s la plupart du temps sur le nombre d&#8217;utilisateurs actifs, ils...","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/09\/cloud-computing-maitriser-ses-couts-grace-a-une-bonne-gestion-des-identites\/","og_site_name":"RiskInsight","article_published_time":"2011-09-12T15:08:16+00:00","article_modified_time":"2019-12-31T11:25:42+00:00","og_image":[{"width":573,"height":214,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg","type":"image\/jpeg"}],"author":"Emmanuel Cosperec","twitter_misc":{"Written by":"Emmanuel Cosperec","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/09\/cloud-computing-maitriser-ses-couts-grace-a-une-bonne-gestion-des-identites\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/09\/cloud-computing-maitriser-ses-couts-grace-a-une-bonne-gestion-des-identites\/"},"author":{"name":"Emmanuel Cosperec","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/512cf02fc77c33ae348d88e577629bdb"},"headline":"Cloud computing : ma\u00eetriser ses co\u00fbts gr\u00e2ce \u00e0 une bonne gestion des identit\u00e9s","datePublished":"2011-09-12T15:08:16+00:00","dateModified":"2019-12-31T11:25:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/09\/cloud-computing-maitriser-ses-couts-grace-a-une-bonne-gestion-des-identites\/"},"wordCount":554,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/09\/cloud-computing-maitriser-ses-couts-grace-a-une-bonne-gestion-des-identites\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg","keywords":["Cloud","IAM","identit\u00e9","identity &amp; access management","protection des donn\u00e9es"],"articleSection":["Cybersecurity &amp; Digital Trust","Digital Identity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/09\/cloud-computing-maitriser-ses-couts-grace-a-une-bonne-gestion-des-identites\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/09\/cloud-computing-maitriser-ses-couts-grace-a-une-bonne-gestion-des-identites\/","name":"Cloud computing : ma\u00eetriser ses co\u00fbts gr\u00e2ce \u00e0 une bonne gestion des identit\u00e9s - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/09\/cloud-computing-maitriser-ses-couts-grace-a-une-bonne-gestion-des-identites\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/09\/cloud-computing-maitriser-ses-couts-grace-a-une-bonne-gestion-des-identites\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg","datePublished":"2011-09-12T15:08:16+00:00","dateModified":"2019-12-31T11:25:42+00:00","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/09\/cloud-computing-maitriser-ses-couts-grace-a-une-bonne-gestion-des-identites\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2011\/09\/cloud-computing-maitriser-ses-couts-grace-a-une-bonne-gestion-des-identites\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/09\/cloud-computing-maitriser-ses-couts-grace-a-une-bonne-gestion-des-identites\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg","width":573,"height":214},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/09\/cloud-computing-maitriser-ses-couts-grace-a-une-bonne-gestion-des-identites\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Cloud computing : ma\u00eetriser ses co\u00fbts gr\u00e2ce \u00e0 une bonne gestion des identit\u00e9s"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/512cf02fc77c33ae348d88e577629bdb","name":"Emmanuel Cosperec","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/emmanuel-cosperec\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/642","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/122"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=642"}],"version-history":[{"count":8,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/642\/revisions"}],"predecessor-version":[{"id":6511,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/642\/revisions\/6511"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/6343"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=642"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=642"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=642"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=642"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}